Preview

Proceedings of Telecommunication Universities

Advanced search
Vol 4, No 3 (2018)
View or download the full issue PDF (Russian)
5-16 298
Abstract
In the third part of the paper, a theoretical study of the propagation processes of pulses having the form of hyperbolic secant has been carried out using special single-mode optical fibers with decreasing chromatic dispersion. Simulation has shown that the soliton regime is maintained at the longitude at considerable distances even in the presence of losses in the special fibers, which are compensated by discrete optical amplifiers. Using the simulation, it is also shown that instead of special fibers, several series-connected optical fibers can be successfully used with discretely decreasing group velocity dispersion (GVD). Quasi-soliton fiber-optic communication systems are also theoretically considered, in fiber-optic linear paths of which sections consisting of two optical fibers with different signs of GVD are used. And the residual GVD in the section has a negative sign. This allows, in combination with an op-amp, to realize a quasisoliton mode of operation in the fiber-optic linear path. Quasisoliton pulses are also called solitons with a controlled dispersion. Calculations and modeling using the OptiSystem allowed obtaining engineering formulas and recommendations for designing quasi-soliton fiber-optic communication systems.
17-25 290
Abstract
The transport communication network plays a key role in ensuring the transfer of traffic between access nodes. At the same time, modern Carrier Ethernet network technology, which implements a number of mechanisms for monitoring and managing the state of the transport communication network fragments, does not have built-in protection mechanisms against the targeted attack of the attacker on the communication network. In this regard, the task associated with the evaluation of the probability-time characteristics of the attacker's attack on the transport communication network, functioning on the basis of Carrier Ethernet technology, is actualized. The article examines the functioning of the Сarrier Еthernet transport network in terms of the impact on the computer-style attack "Substitution of the trusted object." A block diagram of the algorithm of the computer attack of this type will be revealed, as well as its mathematical model developed taking into account the profile model of the attack and the method of topological transformation of stochastic networks.
26-44 388
Abstract
The review of theoretical bases of synthesis of scale-time distributions of an affine class is presented. The methodology of wavelet transforms with an adaptive analysis window is analyzed in the interest of processing processes with high parameter non-stationarity. Analytic approaches to synthesis of distributions invariant to affine shifts are generalized. The generality of the scale-time and frequency-time distributions is shown. Analytical expressions and experimental results of the most known forms of affine class distributions are given.
45-53 410
Abstract
The article is devoted to the model of the satellite communication radio link in the high-speed satellite system. Unlike particular models, which take into account thermal noise, intersystem and adjacent interference, and meeting of readiness requirements with rainfall availability is controlled after the system reserve assessment, in the proposed model, the requirements for availability are explicitly taken into account in the form of a constraint. This makes it possible to set and solve the problems of optimizing the distribution of the frequency-energy resource of central earth stations and on-board retransmission complexes by the criterion of maximum bandwidth while meeting the requirements for the reliability of information transmission and the readiness of the duplex direction of satellite communications.
54-64 327
Abstract
The article proposes a stochastic model of a meteor-burst communication that differs from the known ones in that it takes into account the statistical nature of the occurrence of traces of various types. Based on the results of the studies, the initial values of the parameters of the quadrature com-ponents of the signal reflected from traces of various types.
65-73 290
Abstract
The improved EIGRP routing protocol is presents in the paper. The improved EIGRP protocol is to use topological network redundancy and create backup paths. This protocol provides high network stability, if the network topology changes rapidly.
74-84 254
Abstract
The questions of natural science knowledge of the laws of Nature, actualizing the problem of posi-tioning atoms of chemical elements. Using the known physical concepts and methodology of in-formation retrieval of significant indicators of the event, an endogenous model of the atom is formed. A set of mathematical procedures characterizing the systemic nature of changes in the properties of atomic structures is proposed. A series of computational procedures for estimating the mass of atoms over the entire natural numerical series is implemented. The presence of an un-countable set of atomic constructions possessing the fundamental property of exponential reduc-tion of the lifetime is established.
85-97 273
Abstract
With the rapid development and general acceptance of the Internet globally, concealing one’s identity (remaining unknown) for protection and security reasons while communicating over Internet is of great concern. Thus, anonymity has turned into an essential and legitimate aim in numerous applications, including anonymous web surfing, location based services, and E-voting. This study compares existing implementation of various low latency anonymous communication systems, more precisely, onion routing techniques, with respect to user requirements such as performance, reliability and usability to determine their level of efficiency.
98-105 275
Abstract
In the work presented the topic of taking into account the spectral characteristics of the test signal when evaluating the subjective perception of nonlinear distortions is disclosed. The most significant characteristic - tonality is chosen and a quantitative measure of this characteristic is proposed - the tonality


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)